VPNAntivirusMalwareTwo-FactorAuthenticationPhishingSpearPhishingTypesofHackersSecurityAwarenessTrainingPassPhaseRespondAdvancedPersistentThreatIdentifyLeastPrivilegeProtectSSLDecryptFirewallSecureEmailSecurePasswordRiskAssessmentAssetManagementPatchManagementRecoverDetectDataDiscoveryVPNAntivirusMalwareTwo-FactorAuthenticationPhishingSpearPhishingTypesofHackersSecurityAwarenessTrainingPassPhaseRespondAdvancedPersistentThreatIdentifyLeastPrivilegeProtectSSLDecryptFirewallSecureEmailSecurePasswordRiskAssessmentAssetManagementPatchManagementRecoverDetectDataDiscovery

CYBER SECURITY - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. VPN
  2. Antivirus
  3. Malware
  4. Two-Factor Authentication
  5. Phishing
  6. Spear Phishing
  7. Types of Hackers
  8. Security Awareness Training
  9. PassPhase
  10. Respond
  11. Advanced Persistent Threat
  12. Identify
  13. Least Privilege
  14. Protect
  15. SSL Decrypt
  16. Firewall
  17. Secure Email
  18. Secure Password
  19. Risk Assessment
  20. Asset Management
  21. Patch Management
  22. Recover
  23. Detect
  24. Data Discovery